Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- https://developer.hashicorp.com/vault/docs/secrets/kv
- https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf
- https://owasp.org/www-project-top-ten/
- https://www.ftc.gov/enforcement/refunds/equifax-data-breach-settlement
- https://www.forbes.com/sites/thomasbrewster/2019/07/24/deliveroo-accounts-hacked-and-sold-on-dark-web/?sh=3fe8114d42ff
- https://www.darkreading.com/attacks-breaches/capital-one-attacker-exploited-misconfigured-aws-databases
- https://kubernetes.io/docs/tasks/configmap-secret/managing-secret-using-kubectl/